Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions
Questions # 181:

Which service allows a user export application usage and performance statistics with Cisco Application Visibility

and control?

Options:

A.

SNORT


B.

NetFlow


C.

SNMP


D.

802.1X


Expert Solution
Questions # 182:

Which threat involves software being used to gain unauthorized access to a computer system?

Options:

A.

virus


B.

NTP amplification


C.

ping of death


D.

HTTP flood


Expert Solution
Questions # 183:

An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?

Options:

A.

Summarized server-name information and MD5-hashed path information


B.

complete URL,without obfuscating the path segments


C.

URL information collected from clients that connect to the Cisco WSA using Cisco AnyConnect


D.

none because SensorBase Network Participation is disabled by default


Expert Solution
Questions # 184:

Which two Cisco ISE components must be configured for BYOD? (Choose two.)

Options:

A.

local WebAuth


B.

central WebAuth


C.

null WebAuth


D.

guest


E.

dual


Expert Solution
Questions # 185:

A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?

Options:

A.

Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy


B.

Make the priority for the new policy 5 and the primary policy 1


C.

Change the encryption to AES* to support all AES algorithms in the primary policy


D.

Make the priority for the primary policy 10 and the new policy 1


Expert Solution
Questions # 186:

What is a difference between an XSS attack and an SQL injection attack?

Options:

A.

SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist in many different types of applications


B.

XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications


C.

SQL injection attacks are used to steal information from databases whereas XSS attacks are used toredirect users to websites where attackers can steal data from them


D.

XSS attacks are used to steal information from databases whereas SQL injection attacks are used toredirect users to websites where attackers can steal data from them


Expert Solution
Questions # 187:

In an IaaS cloud services model, which security function is the provider responsible for managing?

Options:

A.

Internet proxy


B.

firewalling virtual machines


C.

CASB


D.

hypervisor OS hardening


Expert Solution
Questions # 188:

What is the benefit of integrating Cisco ISE with a MDM solution?

Options:

A.

It provides compliance checks for access to the network


B.

It provides the ability to update other applications on the mobile device


C.

It provides the ability to add applications to the mobile device through Cisco ISE


D.

It provides network device administration access


Expert Solution
Questions # 189:

Which deployment model is the most secure when considering risks to cloud adoption?

Options:

A.

Public Cloud


B.

Hybrid Cloud


C.

Community Cloud


D.

Private Cloud


Expert Solution
Questions # 190:

What is the purpose of the Cisco Endpoint IoC feature?

Options:

A.

It is an incident response tool.


B.

It provides stealth threat prevention.


C.

It is a signature-based engine.


D.

It provides precompromise detection.


Expert Solution
Questions # 191:

vQuestion # 191

Refer to the exhibit When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZjnside zone once the configuration is deployed?

Options:

A.

All traffic from any zone to the DMZ_inside zone will be permitted with no further inspection


B.

No traffic will be allowed through to the DMZ_inside zone regardless of if it's trusted or not


C.

All traffic from any zone will be allowed to the DMZ_inside zone only after inspection


D.

No traffic will be allowed through to the DMZ_inside zone unless it's already trusted


Expert Solution
Questions # 192:

Which two preventive measures are used to control cross-site scripting? (Choose two)

Options:

A.

Enable client-side scripts on a per-domain basis.


B.

Incorporate contextual output encoding/escaping.


C.

Disable cookie inspection in the HTML inspection engine.


D.

Run untrusted HTML input through an HTML sanitization engine.


E.

Same Site cookie attribute should not be used.


Expert Solution
Questions # 193:

Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?

Options:

A.

Cisco ISE


B.

Cisco NAC


C.

Cisco TACACS+


D.

Cisco WSA


Expert Solution
Questions # 194:

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?

Options:

A.

Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not


B.

Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco WSA.


C.

URL categories are updated more frequently on Cisco CWS than they are on Cisco WSA


D.

Content scanning for SAAS cloud applications is available through Cisco CWS and not available through Cisco WSA


Expert Solution
Questions # 195:

How is data sent out to the attacker during a DNS tunneling attack?

Options:

A.

as part of the UDP/53 packet payload


B.

as part of the domain name


C.

as part of the TCP/53 packet header


D.

as part of the DNS response packet


Expert Solution
Viewing page 13 out of 15 pages
Viewing questions 181-195 out of questions